summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/authfile.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* don't use errno for key_{load,save}_private; discussion w/ solar@openwallmarkus2001-04-151-15/+17
|
* KNFmarkus2001-03-261-9/+9
|
* simpler key load/save interface, see authfile.hmarkus2001-03-261-162/+181
|
* improve fd handlingderaadt2001-02-211-7/+14
|
* sync with netbsd tree changes.itojun2001-02-081-1/+2
| | | | | | - more strict prototypes, include necessary headers - use paths.h/pathnames.h decls - size_t typecase to int -> u_long
* spelling. use sizeof vs. strlen(). ok markus@stevesk2001-01-281-13/+13
|
* split ssh.h and try to cleanup the #include mess. remove unnecessary #includes.markus2001-01-211-6/+5
| | | | rename util.[ch] -> misc.[ch]
* allow ssh -i userkey for rootmarkus2000-12-201-2/+2
|
* replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned'markus2000-12-191-7/+7
| | | | with u_char.
* remove() -> unlink() for consistencymarkus2000-12-191-2/+2
|
* add support for RSA to SSH2. please test.markus2000-11-121-56/+80
| | | | | | | | | | | | | | | there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication.
* new cipher frameworkmarkus2000-10-111-22/+22
|
* cleanup copyright notices on all files. I have attempted to be accurate withderaadt2000-09-071-8/+29
| | | | | | | the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.
* enable ssh-add -d for DSA keysmarkus2000-09-051-1/+56
|
* OpenBSD tagmarkus2000-06-201-1/+1
|
* split auth/sshconnect in one file per protocol versionmarkus2000-04-261-1/+1
|
* add DSA pubkey auth and other SSH2 fixes. use ssh-keygen -[xX]markus2000-04-261-29/+177
| | | | | for trading keys with the real and the original SSH, directly from the people who invented the SSH protocol.
* whitespace cleanupmarkus2000-04-141-7/+7
|
* #include <ssl/foo.h> -> <openssh/foo.h>markus2000-04-121-2/+2
|
* remove unused argument, split cipher_mask()markus2000-04-041-4/+4
|
* properly name fd variablederaadt1999-12-061-25/+26
|
* KNF, final part 3markus1999-11-241-27/+36
|
* much more KNFderaadt1999-11-241-15/+15
|
* KNF part 1markus1999-11-231-292/+277
|
* make sure ~/.ssh/authorized_keys is not writable for group/world (sshd)markus1999-10-111-1/+15
| | | | don't load private keys if they are group/world-{rwx} (ssh,sshd and ssh-add)
* better way to deal with authfile cipher; dugsong@provos1999-09-301-3/+3
|
* off_t, but needs more looking at laterderaadt1999-09-301-9/+9
|
* we have to enable SSH_CIPHER_NONE for unprotected host keys, etc...provos1999-09-301-2/+3
|
* convert all uses of gmp to SSL bignumprovos1999-09-281-38/+59
| | | | | | convert all used of rsa to SSL rsa functions remove all use of randomstate to OpenBSD arc4random() and arc4_stir() all this done at a long long night in Canada.
* all the idea code goes awayderaadt1999-09-261-2/+1
|
* i bet a lot of people didn't know what ssh 1.2.16 had a nice license.deraadt1999-09-261-0/+315
well, except for the patent issues. someone in sweden (forget their name at the moment) cleaned out most of the patented code, and now this code removes rsa code. when this is done, it will link against libssl, but the work isn't completely done yet. then we need to bring this up to modern days, featurewise.